Cryptography 2076

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2076
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

1. Answer following questions in short (any five)

Official Answer
AI Generated Answer

AI is thinking...

        a. How MAC differs from Hash? Is authentication and authorization refers to same term or different? Justify.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b. Differentiate between virus and worms.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        c. What is the importance of Trap Door function in cryptography?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        d. How many rounds are used in AES and what does the number of rounds depend on?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        e. What does Zn refer to in cryptography? Illustrate with an example.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        f. List the five services that PGP operation is based on.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        g. John obtains Peter's credit card number and performs shopping. Does it violate confidentiality or integrity or both? Justify.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2. a. What is Fermat's Little theorem? What is the totient of a prime number? Give an example.

                OR

    Define primitive root of a prime number with a suitable example,

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b. Find the multiplicative inverse of 11 in Z26 using extended Euclidean algorithm.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3. a. Find the result of the following operations.

        i) 27 mod 5        ii) 36 mod 12        iii) -18 mod 14        iv) -7 mod 10        v) -13 mod 7

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b. How can RSA can be used for generating public and private key? Explain.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4. a. Encrypt the message "computing for human life" to playfair cipher using key "BSCCSIT".

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b. Explain about the working mechanism of Kerberos.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. a. Does it possible to design collision free hash function? What does birthday attack refers to? Explain.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

            OR

    What is the role of SSL Record Protocol in SSL/TLS? Explain.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b. Describe the "mix columns" transformation that constitutes the third step in each round of AES.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. a. Define digital signature. How certificates are issued in PKI trust models? Explain.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b. List the modes of operation in cryptography? Describe the Fiestel cipher structure.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...